We have addressed some of the threats posed by viruses, worms and Trojans. There are hardware and software available to deal with many of the problems posed by this malware, but the evolving nature of the threat requires an evolving response. Some software has been designed to recognize patterns and anomalies to better deal with the evolving threat. Humans continue to play a key role, however. Additionally, even the best of hardware and software defenses can sometimes be circumvented through social engineering. Social engineering is the duping of insiders in order to get them to reveal helpful information. For example, a hacker posing as a General officer may call an enlisted system administrator and pretend he forgot his password. If the system administrator falls for this social engineering, the hacker will be able to enter the system with the password and bypass all the hardware and software defenses.
<img src="../../images/cy103145.gif" width="780" height="456" border="0">
Glossary
Resources
Show Text
Site Map
Help
Exit
Back
18 of 19
Next